Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Trademarks As Surveillance Transparency, Amanda Levendowski Jan 2021

Trademarks As Surveillance Transparency, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

We know very little about the technologies that watch us. From cell site simulators to predictive policing algorithms, the lack of transparency around surveillance technologies makes it difficult for the public to engage in meaningful oversight. Legal scholars have critiqued various corporate and law enforcement justifications for surveillance opacity, including contract and intellectual property law. But the public needs a free, public, and easily accessible source of information about corporate technologies that might be used to watch us. To date, the literature has overlooked a free, extensive, and easily accessible source of information about surveillance technologies hidden in plain sight: …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


The National Security Implications And Potential Solutions For The Unintended Consequences Of The 1980 Bayh-­‐Dole Act On Brain-­‐Injured Veterans From The Wars In Iraq And Afghanistan, Colonel Noel Christian Pace Apr 2014

The National Security Implications And Potential Solutions For The Unintended Consequences Of The 1980 Bayh-­‐Dole Act On Brain-­‐Injured Veterans From The Wars In Iraq And Afghanistan, Colonel Noel Christian Pace

University of Miami National Security & Armed Conflict Law Review

Traumatic brain injury (TBI) is the “signature wound” seen in veterans from the wars in Iraq and Afghanistan, from which the U.S. now has over 20,000 young veterans living with TBI. However, some unintended consequences of the Bayh-­‐Dole Act of 1980, a law designed to tap the “secret weapon” of federally funded research & development (R&D) to help the U.S. return to competitiveness after the recession of the late 1970’s, are now preventing these heroes from getting the treatment and cures they need. This article reviews the history of American academia’s close cooperation with the U.S. government in solving military …